*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck 50, {ffffe00169de3000, 0, fffff803b3b7e820, 0}
*** WARNING: Unable to verify timestamp for Qcamainx64.sys
*** ERROR: Module load completed but symbols could not be loaded for Qcamainx64.sys
Could not read faulting driver name
Probably caused by : [COLOR=#b22222]Qcamainx64.sys[/COLOR] ( Qcamainx64+100563 )
Followup: MachineOwner
---------
0: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
PAGE_FAULT_IN_NONPAGED_AREA (50)
Invalid system memory was referenced. This cannot be protected by try-except,
it must be protected by a Probe. Typically the address is just plain bad or it
is pointing at freed memory.
Arguments:
Arg1: ffffe00169de3000, memory referenced.
Arg2: 0000000000000000, value 0 = read operation, 1 = write operation.
Arg3: fffff803b3b7e820, If non-zero, the instruction address which referenced the bad memory
address.
Arg4: 0000000000000000, (reserved)
Debugging Details:
------------------
Could not read faulting driver name
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff803b3d72138
unable to get nt!MmNonPagedPoolStart
unable to get nt!MmSizeOfNonPagedPoolInBytes
ffffe00169de3000
FAULTING_IP:
nt!memcpy+a0
fffff803`b3b7e820 f30f6f040a movdqu xmm0,xmmword ptr [rdx+rcx]
MM_INTERNAL_CODE: 0
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: WIN8_DRIVER_FAULT
BUGCHECK_STR: AV
PROCESS_NAME: System
CURRENT_IRQL: 0
ANALYSIS_VERSION: 6.3.9600.17237 (debuggers(dbg).140716-0327) amd64fre
TRAP_FRAME: ffffd000263f0b80 -- (.trap 0xffffd000263f0b80)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=ffffd00029262960
rdx=0000100140b80696 rsi=0000000000000000 rdi=0000000000000000
rip=fffff803b3b7e820 rsp=ffffd000263f0d18 rbp=ffffc0010e4b6140
r8=0000000000000000 r9=0000000000000035 r10=0000098000000000
r11=ffffd00029262000 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
nt!memcpy+0xa0:
fffff803`b3b7e820 f30f6f040a movdqu xmm0,xmmword ptr [rdx+rcx] ds:ffffe001`69de2ff6=????????????????????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff803b3ba30e7 to fffff803b3b71fa0
STACK_TEXT:
ffffd000`263f0998 fffff803`b3ba30e7 : 00000000`00000050 ffffe001`69de3000 00000000`00000000 ffffd000`263f0b80 : nt!KeBugCheckEx
ffffd000`263f09a0 fffff803`b3a859c9 : 00000000`00000000 ffffe001`5b228880 ffffd000`263f0b80 ffffe001`5b228880 : nt! ?? ::FNODOBFM::`string'+0x20c37
ffffd000`263f0a40 fffff803`b3b7c22f : 00000000`00000000 00000000`00000000 00000000`00000000 ffffd000`263f0b80 : nt!MmAccessFault+0x7a9
ffffd000`263f0b80 fffff803`b3b7e820 : fffff803`b3a9c5e4 c0011a94`00000000 00000000`00000001 fffffa80`00000001 : nt!KiPageFault+0x12f
ffffd000`263f0d18 fffff803`b3a9c5e4 : c0011a94`00000000 00000000`00000001 fffffa80`00000001 fffffa80`0b4c0d20 : nt!memcpy+0xa0
ffffd000`263f0d20 fffff803`b3a9bde4 : ffffe001`00000000 00000000`0ab00000 ffffd000`263f0f58 ffffd000`263f0f2c : nt!MmCopyToCachedPage+0x404
ffffd000`263f0ef0 fffff803`b3a9b313 : ffffe001`60912320 ffffe001`69de2696 ffffd000`263f1048 ffffe001`96518b7e : nt!CcMapAndCopyInToCache+0x228
ffffd000`263f0fe0 fffff801`6fe5d6db : ffffe001`61629430 ffffd000`263f12e0 ffffe001`5b2f9350 00000000`00000000 : nt!CcCopyWriteEx+0x1bb
ffffd000`263f1080 fffff801`6fe605ac : ffffe001`5b0673e8 ffffe001`5dd24201 ffffd000`263f12f8 00000000`00000000 : Ntfs!NtfsCommonWrite+0xabb
ffffd000`263f12b0 fffff801`6fd31cf8 : ffffe001`633d4ac0 ffffe001`5b2f9350 ffffe001`5b2f9350 ffffe001`5b2f9738 : Ntfs!NtfsFsdWrite+0x1dc
ffffd000`263f1370 fffff801`6fd300b6 : ffffe001`5cb462e0 ffffe001`61629430 ffffe001`5b2f9350 ffffe001`5b228ed8 : fltmgr!FltpLegacyProcessingAfterPreCallbacksCompleted+0x258
ffffd000`263f1410 fffff803`b3e238fc : 00000000`00000001 ffffd000`263f14f1 ffffe001`61629430 fffff801`6fd5aac1 : fltmgr!FltpDispatch+0xb6
ffffd000`263f1470 fffff803`b3e232a8 : ffffe001`61629404 ffffe001`61629430 fffff801`00000004 ffffe001`61629430 : nt!IopSynchronousServiceTail+0x16c
ffffd000`263f1540 fffff803`b3b7d7b3 : ffffd000`263f1700 00000000`00000000 00000000`00000000 00000000`00000000 : nt!NtWriteFile+0x750
ffffd000`263f1660 fffff803`b3b75c00 : fffff801`7250f563 00000000`00000000 ffffd000`263f1a40 fffff801`725bdad0 : nt!KiSystemServiceCopyEnd+0x13
ffffd000`263f1868 fffff801`7250f563 : 00000000`00000000 ffffd000`263f1a40 fffff801`725bdad0 00000000`bb0020dd : nt!KiServiceLinkage
ffffd000`263f1870 00000000`00000000 : ffffd000`263f1a40 fffff801`725bdad0 00000000`bb0020dd ffffd000`263f18d0 : Qcamainx64+0x100563
STACK_COMMAND: kb
FOLLOWUP_IP:
Qcamainx64+100563
fffff801`7250f563 ?? ???
SYMBOL_STACK_INDEX: 10
SYMBOL_NAME: Qcamainx64+100563
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: Qcamainx64
IMAGE_NAME: Qcamainx64.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 53e46879
FAILURE_BUCKET_ID: AV_Qcamainx64+100563
BUCKET_ID: AV_Qcamainx64+100563
ANALYSIS_SOURCE: KM
FAILURE_ID_HASH_STRING: km:av_qcamainx64+100563
FAILURE_ID_HASH: {d3578ad1-fe31-373d-8a51-efa06c0316a5}
Followup: MachineOwner
---------